News Clip1:49
Bloomberg

What Have We Learned From Sonys Hack Attack?

Higher Ed
Dec. 19 -- Bloomberg's Mia Saini reports on lessons learned from Sonys hack attack. She speaks on In The Loop. (Source: Bloomberg)
News Clip1:16
Bloomberg

The Top Three Stocks to Watch in Asia Today

Higher Ed
Dec. 18 -- In todays Stock Exchange, Bloomberg's Yvonne Man, Shery Ahn and David Ingles discuss todays top three stocks to watch in Asia on First Up. (Source: Bloomberg)
News Clip2:49
Bloomberg

Details of Facebook, Snapchat Talks Exposed in Sony Hack

Higher Ed
Dec. 17 -- Bloomberg's Sarah Frier reports on further details emanating from the cyber attack on Sony. She speaks on Bloomberg West. (Source: Bloomberg)
News Clip3:06
Bloomberg

Sony Cancels Release of 'The Interview

Higher Ed
Dec. 18 -- Sony Pictures has cancelled its Christmas Day release of he movie The Interview just two days after a hacker threatened 9/11 violence on theaters that showed the film. Bloomberg's Yvonne Man reports on First Up. (Source:...
News Clip2:36
Bloomberg

JPMorgan Data Breach: What Information Was Taken?

Higher Ed
Oct. 3 -- Bloomberg's Hans Nichols examines the type of information exposed in the latest data breach at JPMorgan, which affected 76 million households. He speaks on The Pulse.
News Clip1:50
Bloomberg

How Many Dairy Queens Were Breached by Hackers?

Higher Ed
Oct. 10 -- On BWest Byte, Cory Johnson reports on the 395 International Dairy Queens that had customer data compromised by hackers. He speaks on Bloomberg West. (Source: Bloomberg)
Instructional Video
Federal Trade Commission

On Guard Online: Protect Your Computer From Malware

9th - 10th
Learn about malware effects on your computer with this short video. Understand how to avoid, identify and get rid of malicious software. The video is accompanied by a transcript and can be downloaded as well. [3:47]
Audio
Other

It Conversations: Future Proofing Your Privacy

9th - 10th
This podcast addresses the issue of protecting your privacy today with threats from identity theft, malware, government surveillance, and consumer profiling. Marc Hedlund speaks about how can we best protect our future selves from the...
Instructional Video
Other

Linked in Learning: Lynda: Types of Malware

9th - 10th
This video (3:36) discusses the different types of malware, unwanted and malicious software, from the course: Ethical Hacking: The Complete Malware Analysis Process. The transcript is also provided.
Instructional Video
Khan Academy

Khan Academy: What I Do

9th - 10th
What are the responsibilities of an information security and forensics analyst? Ramel, an analyst at CI Security, shares the value of learning from his coworkers and working in a flexible environment that allows him to explore different...
Instructional Video
PBS

Pbs: Nova Science Now: Luis Von Ahn: Computer Scientist

9th - 10th
In this video meet Luis von Ahn, a computer scientist and a professor at Carnegie Mellon who had a most successful idea-CAPTCHA-a test that humans can pass but computers cannot, which has been used to improve the security of Internet...
Audio
Science Friday Initiative

Science Friday: Cyber Warfare

9th - 10th
With the Stuxnet worm still affecting industrial systems around the world, some analysts are saying that the code may have been produced by a government. We'll talk about cyber warfare and computer security.
Audio
Science Friday Initiative

Science Friday: Cyber Attacks May Be Acts of War

9th - 10th
Ira Flatow and guests discuss cyber attacks and the challenges in defining the nature of cyber warfare.
Audio
Science Friday Initiative

Science Friday: Is China"s Military Behind Cyberattacks on u.s.?

9th - 10th
A new report links cyberespionage attacks on the U.S. to a unit of the Chinese military.